CVE-2023-36831
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/07/2023
Última modificación:
26/07/2023
Descripción
*** Pendiente de traducción *** An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition. Service restoration is only possible by rebooting the system.<br />
<br />
The jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations. Other products, platforms, and configurations are not affected by this vulnerability.<br />
<br />
This issue affects Juniper Networks Junos OS on SRX Series:<br />
22.2 versions prior to 22.2R3;<br />
22.3 versions prior to 22.3R2-S1, 22.3R3;<br />
22.4 versions prior to 22.4R1-S2, 22.4R2.<br />
<br />
This issue does not affect Juniper Networks Junos OS versions prior to 22.2R2.<br />
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



